X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/d81ea65da05119d5c6480d373b5d42bbee8ae1ad..b0cf100405e0dd7e4913194cd88b71ff74cf1773:/apps/workbench/app/controllers/users_controller.rb diff --git a/apps/workbench/app/controllers/users_controller.rb b/apps/workbench/app/controllers/users_controller.rb index 189f295f8f..0ca5a85f01 100644 --- a/apps/workbench/app/controllers/users_controller.rb +++ b/apps/workbench/app/controllers/users_controller.rb @@ -7,7 +7,11 @@ class UsersController < ApplicationController def show if params[:uuid] == current_user.uuid - redirect_to project_path(params[:uuid]) + respond_to do |f| + f.html do + redirect_to(params[:return_to] || project_path(params[:uuid])) + end + end else super end @@ -31,7 +35,7 @@ class UsersController < ApplicationController def activity @breadcrumb_page_name = nil - @users = User.limit(params[:limit] || 1000).all + @users = User.limit(params[:limit]) @user_activity = {} @activity = { logins: {}, @@ -84,7 +88,7 @@ class UsersController < ApplicationController def storage @breadcrumb_page_name = nil - @users = User.limit(params[:limit] || 1000).all + @users = User.limit(params[:limit]) @user_storage = {} total_storage = {} @log_date = {} @@ -135,7 +139,6 @@ class UsersController < ApplicationController end def home - @showallalerts = false @my_ssh_keys = AuthorizedKey.where(authorized_user_uuid: current_user.uuid) @my_tag_links = {} @@ -155,7 +158,7 @@ class UsersController < ApplicationController @persist_state[uuid] = 'cache' end - Link.limit(1000).filter([['head_uuid', 'in', collection_uuids], + Link.filter([['head_uuid', 'in', collection_uuids], ['link_class', 'in', ['tag', 'resources']]]). each do |link| case link.link_class @@ -232,16 +235,29 @@ class UsersController < ApplicationController def manage_account # repositories current user can read / write - repo_links = [] - Link.filter([['head_uuid', 'is_a', 'arvados#repository'], - ['tail_uuid', '=', current_user.uuid], - ['link_class', '=', 'permission'], - ['name', 'in', ['can_write', 'can_read']], - ]). - each do |perm_link| - repo_links << perm_link[:head_uuid] - end - @my_repositories = Repository.where(uuid: repo_links) + repo_links = Link. + filter([['head_uuid', 'is_a', 'arvados#repository'], + ['tail_uuid', '=', current_user.uuid], + ['link_class', '=', 'permission'], + ]) + + owned_repositories = Repository.where(owner_uuid: current_user.uuid) + + @my_repositories = (Repository.where(uuid: repo_links.collect(&:head_uuid)) | + owned_repositories). + uniq { |repo| repo.uuid } + + + @repo_writable = {} + repo_links.each do |link| + if link.name.in? ['can_write', 'can_manage'] + @repo_writable[link.head_uuid] = link.name + end + end + + owned_repositories.each do |repo| + @repo_writable[repo.uuid] = 'can_manage' + end # virtual machines the current user can login into @my_vm_logins = {} @@ -297,6 +313,12 @@ class UsersController < ApplicationController end end + def request_shell_access + logger.warn "request_access: #{params.inspect}" + params['request_url'] = request.url + RequestShellAccessReporter.send_request(current_user, params).deliver + end + protected def find_current_links user